Published: January 30, 2012
                    
                            
                
                
                Author(s)
                
                    
                            Ramaswamy Chandramouli                    
                
                
                
                Conference
                
                    Name: Sixth International Conference on Digital Society (ICDS 2012)
                    Dates: January 30 - February 4, 2012
                    Location: Valencia, Spain
                        Citation: pp. 153-158
                
                
                Announcement
                
                    
                
            
                
                Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication uses are being deployed. Assignment of authentication strength for each of the use cases is often based on the total number of three common orthogonal authentication factors – What You Know, What You Have and What You are – used in the particular use case and the entropy associated with each factor chosen. The objective of this paper is analyze the limitation of this approach and present a new methodology for assigning authentication strengths based on the strength of pair wise bindings between the four entities involved in smart card based authentications – the card (token), the token secret, the card holder and the identifier stored in the card The use of the methodology for developing an authentication assurance level taxonomy for a real world smart identity token deployment is also illustrated.
                
                        
                            Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication uses are...
                            
See full abstract
                        
                            Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication uses are being deployed. Assignment of authentication strength for each of the use cases is often based on the total number of three common orthogonal authentication factors – What You Know, What You Have and What You are – used in the particular use case and the entropy associated with each factor chosen. The objective of this paper is analyze the limitation of this approach and present a new methodology for assigning authentication strengths based on the strength of pair wise bindings between the four entities involved in smart card based authentications – the card (token), the token secret, the card holder and the identifier stored in the card The use of the methodology for developing an authentication assurance level taxonomy for a real world smart identity token deployment is also illustrated.
                            Hide full abstract
                         
                    Keywords
                    
                            authentication strength;                             identity verification;                             smart identity token                    
             
                    
            Control Families
            
                    None selected